Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

JK0-019 Questions and Answers

Question # 6

Some visitors are unable to access the wireless network. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors?

Building ABuilding BBuilding C

Channel: 2Channel: 6Channel: 11

Encryption: WPA2Encryption: WPA2Encryption: WPA2

A.

Encryption set to Open in all Buildings

B.

Encryption set to Open in Building B

C.

Encryption set to WEP in Building B

D.

Channel set to 11 in Building B

Full Access
Question # 7

A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the following would be the MOST appropriate solution? (Select TWO).

A.

OC3 line with built-in firewall

B.

DS3 line with a separate firewall

C.

Cable modem with a separate firewall

D.

Dial-up modem with separate firewall

E.

DSL router with firewall capabilities

Full Access
Question # 8

A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?

A.

Reduce the power input on the replacement servers.

B.

Cover the servers with plastic tarps.

C.

Purchase twice as many servers to create high availability clusters.

D.

Transfer the replacement servers offsite to a data center.

Full Access
Question # 9

A technician is troubleshooting Internet connectivity for a PC. Which of the following is MOST likely the reason for Internet connectivity issues upon inspecting the routing table?

A.

The router should be listed as 224.0.0.1

B.

The NIC is set to the wrong subnet mask

C.

The route of last resort is missing

D.

Loopback traffic is weighted higher than NIC interface traffic

Full Access
Question # 10

A network technician is assigned to view websites that a user has visited. Which of the following should the technician review to find this information?

A.

Event viewer

B.

History logs

C.

Network sniffer

D.

System logs

Full Access
Question # 11

A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application?

A.

Network maps

B.

Traffic analysis

C.

Syslog

D.

ICMP

Full Access
Question # 12

A client’s computer is unable to access any network resources. Which of the following utilities can a technician use to determine the IP address of the client’s machine?

A.

ipconfig

B.

nslookup

C.

dig

D.

tracert

Full Access
Question # 13

Which of the following can assist when troubleshooting a cable that meets the 1000BaseLX specification?

A.

Multimeter

B.

OTDR

C.

Link state

D.

Protocol analyzer

Full Access
Question # 14

The network technician is working in an office that has both VoIP telephone lines and analog lines. A user states that the fax machine is not sending or receiving faxes. The network technician determines that the fax machine uses an analog phone line. Which of the following tools would the technician use to troubleshoot the issue?

A.

Cable tester

B.

Buttset

C.

Toner probe

D.

Cable certifier

Full Access
Question # 15

A company would like their technicians to be able to connect to employee desktops remotely via RDP. Which of the following default port numbers need to be opened on the firewall to support this?

A.

143

B.

443

C.

3389

D.

8080

Full Access
Question # 16

A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method?

A.

WEP

B.

CCMP

C.

TKIP

D.

CHAP

Full Access
Question # 17

Ann, a user, connects to her company’s secured wireless network in the conference room when attending meetings. While using the conference room this morning, Ann notices an unsecured wireless network with the same name is available. Ann connects her laptop to this network instead of to the secured one. Ann has fallen victim to which of the following threats?

A.

Rogue access point

B.

ARP poisoning

C.

Replay attack

D.

Evil twin

Full Access
Question # 18

If a wireless key gets compromised, which of the following would MOST likely prevent an unauthorized device from getting onto the network?

A.

Device placement

B.

Wireless standard

C.

Encryption type

D.

MAC filtering

Full Access
Question # 19

A small company is looking to install a wireless network to enable its relatively old fleet of laptops to have limited internet access internally. The technician on the project knows that the units do not support modern encryption standards. If backwards compatibility is the greatest concern, which of the following is the MOST appropriate wireless security type to choose?

A.

WEP

B.

WPS

C.

WPA

D.

WPA2

Full Access
Question # 20

An administrator needs to open ports in the firewall for both DNS and eDNS. Which of the following default ports would need to be opened on the firewall? (Select TWO).

A.

TCP 23

B.

TCP 53

C.

TCP 123

D.

UDP 23

E.

UDP 53

F.

UDP 123

Full Access
Question # 21

Which of the following is the FASTEST Ethernet technology?

A.

10GBaseSR

B.

10BaseT

C.

100BaseFX

D.

1000BaseT

Full Access
Question # 22

A customer wants to keep cost to a minimum and has only ordered a single static IP address from the ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address?

A.

VLANs

B.

PoE

C.

PAT

D.

VPN

Full Access
Question # 23

A multi-layer switch operates at which of the following OSI layers?

A.

Layers 1 and 5

B.

Layers 2 and 3

C.

Layers 4 and 5

D.

Layers 5 and 6

Full Access
Question # 24

A SOHO client has tasked Joe, a technician, with setting up a basic SOHO network to support four laptops and one desktop PC. The client would also like to have a basic wireless network to use for internal devices only that is secure. Given the list of requirements, which of the following devices would Joe need to purchase for his client? (Select TWO).

A.

IDS

B.

Repeater

C.

Switch

D.

WAP

E.

UTM device

Full Access
Question # 25

A technician finds that the network card is no longer functioning. At which of the following OSI layers is the problem occurring?

A.

Layer 1

B.

Layer 3

C.

Layer 5

D.

Layer 7

Full Access
Question # 26

Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances?

A.

RADIUS

B.

DNS

C.

DHCP

D.

IDS

Full Access
Question # 27

A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO).

A.

Combined DNS and DHCP hosting

B.

Encryption

C.

Content filtering

D.

Fault tolerance

E.

Website caching

Full Access
Question # 28

Which of the following ports would have to be allowed through a firewall for NTP to pass on its default port?

A.

123

B.

143

C.

153

D.

163

Full Access
Question # 29

Which of the following port numbers needs to be open on a firewall to allow FTP traffic?

A.

21

B.

22

C.

23

D.

25

Full Access
Question # 30

Joe, a user, has a computer that has a link light on his network interface card (NIC); however, Joe is unable to access the Internet. Which of the following is the cause of this issue?

A.

Faulty GBIC

B.

Faulty SFP

C.

Cable is a crossover

D.

VLAN mismatch

Full Access
Question # 31

A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use?

A.

A 12 port unmanaged switch.

B.

A wired router with an 8 port switch and a WAN port.

C.

A wireless router with an 8 port switch, and a WAN port.

D.

A 8 port firewall with one console port.

Full Access
Question # 32

A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this?

A.

MPLS

B.

Caching engines

C.

QoS

D.

Load balancing

Full Access
Question # 33

A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration?

A.

Port filtering

B.

WEP

C.

MAC address filtering

D.

PoE

Full Access
Question # 34

Which of the following wireless parameters may need to be modified when a new cordless telephone is installed?

A.

Encryption type

B.

SSID

C.

IP address

D.

Channel

Full Access
Question # 35

After a network technician has added a new workstation and cabling to the network, users report the network is very slow. The activity lights on all switches are blinking rapidly, showing large amounts of traffic. Which of the following is the BEST explanation for the traffic?

A.

The new user is downloading large files.

B.

The router failed, flooding the network with beacons.

C.

The new user’s IP address is a duplicate.

D.

A switching loop was created.

Full Access
Question # 36

A user is unable to communicate with any local network resources, but is connected to the wireless network and can access the Internet. The network technician notices that the laptop has an incorrect IP address, even though it shows it is connected. Which of the following is the MOST likely cause?

A.

Signal strength

B.

Interference

C.

AP placement

D.

Incorrect SSID

Full Access
Question # 37

Which of the following commands will provide an administrator with the number of hops a packet takes from host to host?

A.

nslookup

B.

ping

C.

traceroute

D.

route

Full Access
Question # 38

The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem?

A.

Incorrect service set identifier

B.

Low signal strength or interference

C.

Incorrect encryption scheme

D.

Incorrect IP address or subnet mask

Full Access
Question # 39

Joe, a network technician, is asked to install a couple new WAP’s inside a back warehouse that was added to a main warehouse facility that already has complete wireless coverage on both the 2.4GHz and 5GHz frequencies. Joe already has a complete wireless heat map of the main warehouse. Which of the following is the first step that Joe should do before choosing which WAP’s to use?

A.

Conduct a wireless survey of the back warehouse.

B.

Ask the vendor that provided the WAP’s for the main warehouse for recommendations.

C.

Ask the systems administrator which WAP’s are preferred.

D.

Only order WAP’s that support 5GHz channels.

Full Access
Question # 40

All users on a specific network segment report losing access to the wired network. During troubleshooting, the network administrator observes link lights on the workstations. When physically reviewing each switch, the network administrator changes the switch view settings to Activity and sees that all port lights remain solid green. Which of the following is MOST likely causing this issue?

A.

STP convergence

B.

Power failure

C.

Excessive bandwidth usage

D.

Broadcast storm

Full Access
Question # 41

A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST?

A.

VLAN settings

B.

History logs

C.

Patch cable

D.

Port security

Full Access
Question # 42

Which of the following is needed when using WPA2-Enterprise wireless encryption?

A.

TFTP

B.

RADIUS

C.

LDAP

D.

IPSec

Full Access
Question # 43

A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review?

A.

Signal strength

B.

SSID name

C.

WPA2 encryption

D.

WEP encryption

Full Access
Question # 44

Users have been stating that they need to logon to too many applications and web apps with different credentials that use different rule sets. Which of the following would BEST address these concerns?

A.

Alter the domain account login policies to reflect the most common application rule sets.

B.

Ensure that the user accounts are properly configured in domain services.

C.

Implement a software solution that facilitates single sign-on authentication.

D.

Increase the time between mandatory password changes by a factor of three.

Full Access
Question # 45

A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated wattage the switch supports to power all of the phones at full power?

A.

96W

B.

168W

C.

240W

D.

369.6W

Full Access
Question # 46

GigSwitch1 is currently configured with a speed of 100 and Duplex is set to Auto on all interfaces. Interface 2 will be connected to GigSwitch2 which is used for all departments. Interface 1 will be used for HR traffic only.

GigSwitch1 needs to be configured with the following parameters:

Configure the necessary protocol to prevent switching loops

Configure GigSwitch1 with a /24 IP address for management

Traffic across Interface 1 needs to be forced to accept and receive up to 100Mbps data at the same time

Traffic across Interface 2 needs to be forced to use Gigabit speeds and maximum performance

Drag and drop the appropriate configurations to their corresponding requirements. All placeholders must be filled. Not all configurations will be used.

Full Access
Question # 47

Which of the following WAN technologies has synchronous up/down speeds?

A.

T1

B.

ADSL

C.

Satellite

D.

Cable broadband

Full Access
Question # 48

Which of the following WAN technology types are mainly used over POTS lines to provide Internet connectivity? (Select TWO).

A.

Dialup

B.

DSL

C.

SONET

D.

Cable

E.

WiMAX

F.

LTE

Full Access
Question # 49

Which of the following 802.11 standards transmits the signals the GREATEST distance?

A.

a

B.

b

C.

g

D.

n

Full Access
Question # 50

Which of the following wireless standards can operate on the same frequency but are not compatible?

A.

802.11a / 802.11b

B.

802.11a / 802.11n

C.

802.11b / 802.11g

D.

802.11g / 802.11n

Full Access
Question # 51

A small business owner is in the process of setting up a SOHO office. The office has only one connection to the Internet via a broadband cable connection. The office has four subnets that must be able to connect to the Internet. Which of the following devices would enable the owner to meet these requirements?

A.

A firewall

B.

A router

C.

A hub

D.

A Layer 2 switch

Full Access
Question # 52

Frame relay occurs at which of the following layers of the OSI model?

A.

Layer 1

B.

Layer 2

C.

Layer 4

D.

Layer 6

Full Access
Question # 53

Several users from the finance department report that they are able to access the Internet, but unable to connect to their financial applications. The network technician is unable to ping the finance server. The technician decides to check the switch and determines that Internet access is working. Which of the following is a possible cause of the access issues?

A.

Faulty cable

B.

Remote management disabled

C.

Improper VLAN assignment

D.

Mismatched duplex

Full Access
Question # 54

A network technician visits a site that needs voice connectivity to the corporate office and installs four IP phones. The phone exchange resides at the telephone company. Which of the following technologies is being used?

A.

Virtual switch

B.

Virtual server

C.

Virtual desktop

D.

Virtual PBX

Full Access
Question # 55

Which of the following DNS records must be queried to resolve the IPv6 address of a website?

A.

CNAME

B.

PTR

C.

AAAA

D.

A

Full Access
Question # 56

Which of the following DNS records is used in conjunction with 192:168::1:10?

A.

AAAA

B.

MX

C.

TXT

D.

PTR

Full Access
Question # 57

At which of the following layers of the OSI model do packets exist?

A.

Network

B.

Session

C.

Data Link

D.

Transport

Full Access
Question # 58

Companies trying to cut down on constant documentation of IP addresses could use which of the following?

A.

Longer lease times

B.

More reservations

C.

Larger scopes

D.

Dynamic IP addressing

Full Access
Question # 59

Which of the following devices acts as a gateway between clients and servers?

A.

WINS server

B.

Proxy server

C.

Content filter

D.

DNS server

Full Access
Question # 60

A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working?

A.

nbstat

B.

arp

C.

nslookup

D.

ipconfig

Full Access
Question # 61

A company needs to find a way to best route latency-sensitive traffic appropriately on an already congested network. Which of the following would be BEST suited for this purpose?

A.

QoS

B.

PPPoE

C.

RADIUS

D.

VPN

Full Access
Question # 62

Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions?

A.

Redundancy

B.

Fault tolerance

C.

Unified communications

D.

Uptime requirements

Full Access
Question # 63

A user is having trouble with their fax machine disconnecting during transmissions. The technician believes that a DSL signal may be on the same line as the fax. Which of the following tools would MOST likely help prove this hypothesis?

A.

Multimeter

B.

Cable tester

C.

Lineman's handset

D.

Toner probe

Full Access
Question # 64

The components of a NIC function at which of the following layers of the OSI model? (Select TWO).

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

E.

Layer 5

Full Access
Question # 65

Which of the following OSI model layers is used to frame packets that are sent over a medium?

A.

Session

B.

Data link

C.

Physical

D.

Transport

Full Access
Question # 66

At which of the following layers of the OSI model is the Logical Link Control found?

A.

Layer 2

B.

Layer 3

C.

Layer 4

D.

Layer 5

Full Access
Question # 67

The address 6FFE:FFFF:0000:2F3B:04AC:00FF:FEBE:5C4A is an example of which of the following?

A.

APIPA

B.

MAC

C.

IPv4

D.

IPv6

Full Access
Question # 68

Which of the following is rated for speeds over 800Mbps?

A.

Coaxial

B.

DB-9

C.

CAT6

D.

CAT5e

Full Access
Question # 69

A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?

A.

TCP

B.

SMTP

C.

ICMP

D.

ARP

Full Access
Question # 70

Which of the following tools will scan a network for hosts and provide information on the installed operating system?

A.

DOCSIS

B.

NMAP

C.

IMAP

D.

BERT

Full Access
Question # 71

Which of the following would a network administrator use to scan a network for vulnerabilities?

A.

ICMP

B.

NMAP

C.

ACL

D.

TCPDUMP

Full Access
Question # 72

Which of the following are authentication methods that can use AAA authentication? (Select TWO).

A.

Kerberos

B.

PKI

C.

TKIP/AES

D.

MS-CHAP

E.

RADIUS

F.

TACACS+

Full Access
Question # 73

An administrator would like to scan for open ports on the subnet and determine if any vulnerable applications are listening. Which of the following tools would the administrator MOST likely use?

A.

Ping

B.

Nessus

C.

IMAP

D.

Telnet

Full Access
Question # 74

The company requires all users to authenticate to the network with a smart card, a pin number, and a fingerprint scan. Which of the following BEST describes the user authentication being used?

A.

Multi-factor authentication

B.

Two-factor authentication

C.

Biometrics

D.

Single sign-on

Full Access
Question # 75

An administrator needs to provide remote connectivity to server1, web traffic to server2, and FTP access to server3 using a single outside IP address. Which of the following would the administrator implement on the firewall to accomplish this?

A.

Port Address Translation

B.

Demilitarized Zone

C.

Stateful Packet Inspection

D.

Network Address Translation

Full Access
Question # 76

Users trying to access a website using HTTPS are being blocked by the firewall. Which of the following ports needs to be allowed?

A.

80

B.

143

C.

443

D.

3389

Full Access
Question # 77

The network administrator has been tasked to create a network segment where resources can be placed for public web access.

Which of the following should be implemented?

A.

DMZ

B.

Honeynet

C.

PAT

D.

Port security

Full Access
Question # 78

Which of the following security protocols would BEST protect a connection to a remote email server and ensure full integrity of all transmitted email communication?

A.

TLS 1.2

B.

SNMPv3

C.

WPA2

D.

SMTP

Full Access
Question # 79

A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?

A.

Evil twin

B.

Phishing

C.

Man-in-the-middle

D.

Social engineering

Full Access
Question # 80

A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero day exploits. Which of the following should be deployed?

A.

Behavior based IPS

B.

Signature based IDS

C.

Antivirus software

D.

Access Control Lists

Full Access
Question # 81

A user authenticated to more than one website using their same credentials is an example of:

A.

Multifactor authentication

B.

User access control

C.

Two-factor authentication

D.

Single sign-on

Full Access
Question # 82

Which of the following configurations of a wireless network would be considered MOST secure?

A.

WEP using MAC Filtering

B.

WEP and hiding the SSID

C.

WPA2

D.

WPA TKIP and hiding the SSID

Full Access
Question # 83

A network administrator decides to secure their small network by allowing only specific MAC addresses to gain access to the network from specific switches. Which of the following is described by this example?

A.

Packet filtering

B.

Hardware firewalls

C.

Port security

D.

Stateful inspection

Full Access
Question # 84

Which of the following authentication solutions use tickets that include valid credentials to access additional network resources?

A.

Kerberos

B.

RADIUS

C.

Multi-factor authentication

D.

TACACS+

Full Access
Question # 85

Which of the following would a network administrator MOST likely use to actively discover unsecure services running on a company’s network?

A.

IDS

B.

Nessus

C.

NMAP

D.

Firewall

Full Access
Question # 86

Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).

A.

SSH

B.

3DES

C.

AES

D.

SSL

E.

TLS

F.

TKIP

Full Access
Question # 87

An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?

A.

Antivirus scanner

B.

IDS

C.

Packet sniffer

D.

Toner probe

Full Access
Question # 88

A network technician is troubleshooting signal problems with certain WAPs in an office and finds consistently high ping times across the units. Such an issue is called which of the following?

A.

Latency

B.

Attenuation

C.

Crosstalk

D.

Frequency hopping

Full Access
Question # 89

Which of the following BEST describes the definition of DHCP?

A.

DHCP is utilized to dynamically lease IP addresses to hosts.

B.

DHCP is utilized to statically lease IP address to hosts.

C.

DHCP is utilized to permanently lease IP address dynamically to hosts.

D.

DHCP is utilized to permanently lease IP address statically to hosts.

Full Access
Question # 90

A technician is not getting a link light on two switches connected by a fiber cable. After the cable tests good, which of the following should the technician check NEXT?

A.

Open shorts

B.

Excessive DB loss

C.

TXRX reversed

D.

Split cables

Full Access
Question # 91

A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST?

A.

arp

B.

ipconfig

C.

tracert

D.

route

Full Access
Question # 92

While preparing to replace an old CAT3 cable with a CAT6 cable to implement VoIP, a facilities employee mistakenly disconnects the entire patch panel, including valid wiring to live workstations. Which of the following should an administrator use in order to connect those ports FIRST?

A.

Toner

B.

Multimeter

C.

Reflectometer

D.

Cable tester

Full Access
Question # 93

Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector?

A.

BNC

B.

FSMA

C.

MT-RJ

D.

ST

Full Access
Question # 94

Which of the following is a packet switching WAN technology?

A.

Frame relay

B.

T1

C.

Asynchronous transfer mode

D.

ISDN

Full Access
Question # 95

Which of the following WAN technology types has the GREATEST latency?

A.

ISDN

B.

Fiber

C.

Satellite

D.

Cable

Full Access
Question # 96

A technician has two wireless 802.11g APs. One is set to channel 1 and the other channel 6. The APs appear to interfere with each other. Which of the following is MOST likely the reason?

A.

Channels below 9 overlap each other

B.

Channel width is set to 40MHz

C.

Channels are in the 5GHz range by mistake

D.

Channel 1 should have been set to 11 to avoid an overlap

Full Access
Question # 97

Which of the following cable types supports the FURTHEST distance when connecting various MDFs?

A.

Multimode

B.

UTP

C.

Singlemode

D.

CAT6

Full Access
Question # 98

Which of the following cables has a hard plastic cross inside the cable to separate each pair of wires?

A.

Coaxial

B.

CAT3

C.

CAT5

D.

CAT6a

Full Access
Question # 99

A consultant has been hired to wire a simple small office of ten computers to a layer 2 Ethernet 100BaseT switch. Which of the following cabling will be needed for the installation?

A.

Multimode fiber

B.

RG-59 coaxial

C.

CAT6a

D.

CAT3

Full Access
Question # 100

A technician is installing an 802.11n network. The technician is using a laptop that can connect at a maximum speed of 11 Mbps. The technician has configured the 802.11n network correctly but thinks it could be the type of WLAN card used on the laptop. Which of the following wireless standards is the WLAN card MOST likely using?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Full Access
Question # 101

A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which of the following is considered the demarc?

A.

Premise router

B.

ISP router

C.

Smart jack

D.

CSU/DSU

Full Access
Question # 102

A VoIP system running over a wireless network link is continually being reported as choppy. Which of the following is the cause of this issue?

A.

Frequency

B.

Latency

C.

Interference

D.

Encryption type

Full Access
Question # 103

Which of the following can operate on BOTH the 2.4GHz and 5.8GHz frequencies?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Full Access
Question # 104

Which of the following copper cable types should be chosen to run gigabit speeds through a dropped ceiling that returns airflow?

A.

Non-Plenum CAT5

B.

Non-Plenum CAT5e

C.

Plenum CAT5

D.

Plenum CAT5e

Full Access
Question # 105

Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?

A.

Decreasing radio strength

B.

MAC filtering

C.

WEP encryption

D.

SSID broadcast disable

Full Access
Question # 106

The cost of installing fiber cable in a factory environment is too high. Which of the following cables should be used to minimize the effect of EMI?

A.

CAT6

B.

UTP

C.

Coaxial

D.

Crossover

Full Access
Question # 107

In the event of a fire in an office building, which of the following cable types should be installed to prevent toxic gas from burning PVC cable coatings?

A.

CAT6a

B.

Plenum

C.

Crossover

D.

STP

Full Access
Question # 108

Which of the following is true of a client/server topology?

A.

Virtual servers are used to stream data to other remote servers

B.

Servers are used to connect to centralized clients

C.

Remote clients connect to a centralized server

D.

Remote clients connect to each other via a virtual server

Full Access
Question # 109

The network administrator just upgraded all of the WAPs to new ones with 2.4 GHz b/g/n support. The new WAPs reuse the same location and channel as the previous one and with no new external interference detected. However, performance issues are now occurring that did not exist before. Which of the following would correct the issue?

A.

Configure Wi-Fi Multimedia support

B.

Use only 20 MHz channel bandwidth

C.

Enable band steering to use 802.11n

D.

Configure Quality of Service

Full Access
Question # 110

A technician is troubleshooting a problem where data packets are being corrupted. Which of the following connectivity problems should the technician check?

A.

Attenuation

B.

Latency

C.

Crosstalk

D.

External interference

Full Access
Question # 111

A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:

A.

man-in-the-middle attack

B.

rogue access point

C.

evil twin

D.

packet sniffer

Full Access
Question # 112

A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).

A.

SNMP

B.

Network sniffer

C.

Syslog

D.

System log

E.

History log

Full Access
Question # 113

A network technician has just upgraded a switch. The new switch’s IP range and subnet mask correctly match other network devices. The technician cannot ping any device outside of the switch’s own IP subnet. The previous switch worked correctly with the same settings. Which of the following is MOST likely the problem?

A.

The proxy server is set incorrectly.

B.

The Ethernet cable is pinched.

C.

The network gateway is set incorrectly.

D.

The IP address is set incorrectly.

Full Access
Question # 114

Which of the following would a technician do to monitor remote traffic through an access point?

A.

Enable an SNMP agent

B.

Enable network mapping

C.

Set monitoring SSID

D.

Select WPA2

Full Access
Question # 115

Which of the following can be used to decrypt SSL packets which encapsulate internal network addresses in the payload?

A.

Proxy server

B.

Content filter

C.

Load balancer

D.

VPN concentrator

Full Access
Question # 116

Which of the following can determine the last time an address lease was renewed on a network device?

A.

System log

B.

Packet sniffer

C.

Time domain reflectometer

D.

Stateful packet filter

Full Access
Question # 117

A technician is troubleshooting a computer that will not connect to the Internet. The PC is connected to the network. Which of the following tools should the technician use FIRST to understand the NIC configuration?

A.

Protocol analyzer

B.

ipconfig

C.

nslookup

D.

tracert

Full Access
Question # 118

A technician has been tasked with planning and implementing a new wired-only network for a small office. A hardware list has been compiled, but the technician is unsure about the final necessary item. Which of the following will BEST complete the small wired network setup?

(1) 1000 foot CAT6 spool

(1) crimper

(1) 16 port gigabit switch

(20) RJ-45 connectors

(12) RJ-45 wall jacks

(1) ____________

A.

Compression tool

B.

Punch down tool

C.

Network map

D.

Multimeter

Full Access
Question # 119

A network technician is trying to run a protocol analyzer and is instructed to record the chimney offload state of TCP. Which of the following utilities did the technician use to check this parameter with the output listed below?

Querying active state...

TCP Global Parameters

----------------------------------------------

Receive-Side Scaling State : enabled

Chimney Offload State : disabled

Receive Window Auto-Tuning Level : normal

Add-On Congestion Control Provider : ctcp

ECN Capability : disabled

RFC 1323 Timestamps : disabled

A.

net

B.

netstat

C.

nbtstat

D.

netsh

Full Access
Question # 120

A technician needs to verify the time of a power outage. Which of the following may be used to determine this information?

A.

Network baseline

B.

Tracert

C.

System logs

D.

Protocol analyzer

Full Access
Question # 121

Joe, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?

A.

Change management

B.

System logs

C.

Asset management

D.

Baselining

Full Access
Question # 122

A technician has to terminate a CAT3 cable to a 110 block. Which of the following tools should the technician use?

A.

Loopback plug

B.

Multimeter

C.

Punch down

D.

Crimper

Full Access
Question # 123

The technician is working on a DNS problem. Which of the following software tool is the technician MOST likely to use to troubleshoot this issue?

A.

nslookup

B.

ipconfig

C.

ping

D.

nbtstat

Full Access
Question # 124

Various desktop computers are not getting a link light even though the patch cables were replaced. Cables on a 110-block patch panel are suspected to be causing the issues. Which of the following hardware tools would MOST likely be used to troubleshoot and resolve the issue? (Select TWO).

A.

Cable certifier

B.

Ping command

C.

Punch down tool

D.

Crimper

E.

Toner probe

Full Access